radar

ONE Sentinel

shield

CVE Tracker

74,889 total CVEs

Live vulnerability feed from the National Vulnerability Database

6.2

Solaris Solstice AdminSuite (AdminSuite) 2.1 and 2.2 allows local users to gain privileges via the save option in the Database Manager, which is running with setgid bin privileges.

6.2

Solaris Solstice AdminSuite (AdminSuite) 2.1 and 2.2 create lock files insecurely, which allows local users to gain root privileges.

6.2

Solaris Solstice AdminSuite (AdminSuite) 2.1 follows symbolic links when updating an NIS database, which allows local users to overwrite arbitrary files.

6.2

Solaris Solstice AdminSuite (AdminSuite) 2.1 incorrectly sets write permissions on source files for NIS maps, which could allow local users to gain privileges by modifying /etc/passwd.

6.2

Solaris Solstice AdminSuite (AdminSuite) 2.1 uses unsafe permissions when adding new users to the NIS+ password table, which allows local users to gain root access by modifying their password table entries.

5.0

Directory traversal vulnerability in carbo.dll in iCat Carbo Server 3.0.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the icatcommand parameter.

7.5

Arbitrary command execution via buffer overflow in Count.cgi (wwwcount) cgi-bin program.

7.2

buffer overflow in HP xlock program.

10.0

Buffer overflow in the HTML library used by Internet Explorer, Outlook Express, and Windows Explorer via the res: local resource protocol.

7.2

SGI permissions program allows local users to gain root privileges.

2.1

SGI syserr program allows local users to corrupt files.

5.0

Denial of service of inetd on Linux through SYN and RST packets.

2.1

The open() function in FreeBSD allows local attackers to write to arbitrary files.

10.0

The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).

4.6

AIX piodmgrsu command allows local users to gain additional group privileges.

7.2

AIX nslookup command allows local users to obtain root access by not dropping privileges correctly.

7.2

Various vulnerabilities in the AIX portmir command allows local users to obtain root access.

7.2

Buffer overflow in AIX writesrv command allows local users to obtain root access.

7.2

Buffer overflow in AIX libDtSvc library can allow local users to gain root access.

5.0

Buffer overflow in Rainbow Six Multiplayer allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long nickname (nick) command.

5.0

Buffer overflow in OSF Distributed Computing Environment (DCE) security demon (secd) in IRIX 6.4 and earlier allows attackers to cause a denial of service via a long principal, group, or organization.

7.2

Buffer overflow in AIX xdat gives root access to local users.

7.5

CGI PHP mylog script allows an attacker to read any file on the target server.

10.0

Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable.

5.0

CGI PHP mlog script allows an attacker to read any file on the target server.

Showing 74476-74500 of 74,889 CVEs